# Copyright (C) 1998 by the Free Software Foundation, Inc. # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. """The class representing a Mailman mailing list. Mixes in many task-specific classes.""" try: import mm_cfg except ImportError: raise RuntimeError, ('missing mm_cfg - has Config_dist been configured ' 'for the site?') import sys, os, marshal, string, posixfile, time import re import Utils import Errors from types import StringType, IntType, DictType from ListAdmin import ListAdmin from Deliverer import Deliverer from MailCommandHandler import MailCommandHandler from HTMLFormatter import HTMLFormatter from Archiver import Archiver from Digester import Digester from SecurityManager import SecurityManager from Bouncer import Bouncer from GatewayManager import GatewayManager from Mailman.Logging.StampedLogger import StampedLogger # Note: # an _ in front of a member variable for the MailList class indicates # a variable that does not save when we marshal our state. # Use mixins here just to avoid having any one chunk be too large. class MailList(MailCommandHandler, HTMLFormatter, Deliverer, ListAdmin, Archiver, Digester, SecurityManager, Bouncer, GatewayManager): def __init__(self, name=None, lock=1): if name and name not in Utils.list_names(): raise Errors.MMUnknownListError, 'list not found: %s' % name MailCommandHandler.__init__(self) self.InitTempVars(name, lock) if name: self._full_path = os.path.join(mm_cfg.LIST_DATA_DIR, name) self.Load() def __del__(self): try: for f in self._log_files.values(): f.close() except AttributeError: # List may not have gotten far enough to have proper _log_files! pass def GetMembers(self): """returns a list of the members. (all lowercase)""" return self.members.keys() def GetDigestMembers(self): """returns a list of digest members. (all lowercase)""" return self.digest_members.keys() def GetDeliveryMembers(self): """returns a list of the members with username case preserved.""" res = [] for k, v in self.members.items(): if type(v) is StringType: res.append(v) else: res.append(k) return res def GetDigestDeliveryMembers(self): """returns a list of the members with username case preserved.""" res = [] for k,v in self.digest_members.items(): if type(v) is StringType: res.append(v) else: res.append(k) return res def __AddMember(self, addr, digest): """adds the appropriate data to the internal members dict. If the username has upercase letters in it, then the value in the members dict is the case preserved address, otherwise, the value is 0. """ if Utils.LCDomain(addr) == string.lower(addr): if digest: self.digest_members[addr] = 0 else: self.members[addr] = 0 else: if digest: self.digest_members[string.lower(addr)] = addr else: self.members[string.lower(addr)] = addr def GetAdminEmail(self): return '%s-admin@%s' % (self._internal_name, self.host_name) def GetMemberAdminEmail(self, member): """Usually the member addr, but modified for umbrella lists. Umbrella lists have other mailing lists as members, and so admin stuff like confirmation requests and passwords must not be sent to the member addresses - the sublists - but rather to the administrators of the sublists. This routine picks the right address, considering regular member address to be their own administrative addresses. """ if not self.umbrella_list: return member else: acct, host = tuple(string.split(member, '@')) return "%s%s@%s" % (acct, self.umbrella_member_suffix, host) def GetUserSubscribedAddress(self, member): """Return the member's case preserved address. """ member = string.lower(member) cpuser = self.members.get(member) if type(cpuser) == IntType: return member elif type(cpuser) == StringType: return cpuser cpuser = self.digest_members.get(member) if type(cpuser) == IntType: return member elif type(cpuser) == StringType: return cpuser return None def GetUserCanonicalAddress(self, member): """Return the member's address lower cased.""" cpuser = self.GetUserSubscribedAddress(member) if cpuser is not None: return string.lower(cpuser) return None def GetRequestEmail(self): return '%s-request@%s' % (self._internal_name, self.host_name) def GetListEmail(self): return '%s@%s' % (self._internal_name, self.host_name) def GetListIdentifier(self): """Return the unique (RFC draft-chandhok-listid-02) identifier.""" return ("%s <%s.%s>" % (self.description, self._internal_name, self.host_name)) def GetRelativeScriptURL(self, script_name): prefix = '../' * Utils.GetNestingLevel() return '%s%s%s/%s' % (prefix, script_name, mm_cfg.CGIEXT, self._internal_name) def GetAbsoluteScriptURL(self, script_name): if self.web_page_url: prefix = self.web_page_url else: prefix = mm_cfg.DEFAULT_URL while prefix[-1] == "/": prefix = prefix[:-1] return "%s/%s%s/%s" % (prefix, script_name, mm_cfg.CGIEXT, self._internal_name) def GetAbsoluteOptionsURL(self, addr, obscured=0): # address could come in case-preserved addr = string.lower(addr) options = self.GetAbsoluteScriptURL('options') if obscured: treated = Utils.ObscureEmail(addr, for_text=0) else: treated = addr return "%s/%s" % (options, treated) def GetUserOption(self, user, option): """Return user's setting for option, defaulting to 0 if no settings.""" if option == mm_cfg.Digests: return self.digest_members.has_key(user) if not self.user_options.has_key(user): return 0 return not not self.user_options[user] & option def SetUserOption(self, user, option, value, save_list=1): if not self.user_options.has_key(user): self.user_options[user] = 0 if value: self.user_options[user] = self.user_options[user] | option else: self.user_options[user] = self.user_options[user] & ~(option) if not self.user_options[user]: del self.user_options[user] if save_list: self.Save() # Here are the rules for the three dictionaries self.members, # self.digest_members, and self.passwords: # # The keys of all these dictionaries are the lowercased version of the # address. This makes finding a user very quick: just lowercase the name # you're matching against, and do a has_key() or get() on first # self.members, then if that returns false, self.digest_members # # The value of the key in self.members and self.digest_members is either # the integer 0, meaning the user was subscribed with an all-lowercase # address, or a string which would be the address with the username part # case preserved. Note that for Mailman versions before 1.0b11, the value # could also have been the integer 1. This is a bug that was caused when # a user switched from regular to/from digest membership. If this # happened, you're screwed because there's no way to recover the case # preserved address. :-( # # The keys for self.passwords is also lowercase, although for versions of # Mailman before 1.0b11, this was not always true. 1.0b11 has a hack in # Load() that forces the keys to lowercase. The value for the keys in # self.passwords is, of course the password in plain text. def FindUser(self, email): """Return the lowercased version of the subscribed email address. If email is not subscribed, either as a regular member or digest member, None is returned. If they are subscribed, the return value is guaranteed to be lowercased. """ # shortcut lcuser = self.GetUserCanonicalAddress(email) if lcuser is not None: return lcuser matches = Utils.FindMatchingAddresses(email, self.members, self.digest_members) # sadly, matches may or may not be case preserved if not matches or not len(matches): return None return string.lower(matches[0]) def InitTempVars(self, name, lock): """Set transient variables of this and inherited classes.""" self._tmp_lock = lock self._lock_file = None self._internal_name = name self._ready = 0 self._log_files = {} # 'class': log_file_obj if name: self._full_path = os.path.join(mm_cfg.LIST_DATA_DIR, name) Digester.InitTempVars(self) def InitVars(self, name=None, admin='', crypted_password=''): """Assign default values - some will be overriden by stored state.""" # Non-configurable list info if name: self._internal_name = name # Must save this state, even though it isn't configurable self.volume = 1 self.members = {} # self.digest_members is initted in mm_digest self.data_version = mm_cfg.VERSION self.last_post_time = 0 self.post_id = 1. # A float so it never has a chance to overflow. self.user_options = {} # This stuff is configurable self.filter_prog = mm_cfg.DEFAULT_FILTER_PROG self.dont_respond_to_post_requests = 0 self.num_spawns = mm_cfg.DEFAULT_NUM_SPAWNS self.advertised = mm_cfg.DEFAULT_LIST_ADVERTISED self.max_num_recipients = mm_cfg.DEFAULT_MAX_NUM_RECIPIENTS self.max_message_size = mm_cfg.DEFAULT_MAX_MESSAGE_SIZE self.web_page_url = mm_cfg.DEFAULT_URL self.owner = [admin] self.reply_goes_to_list = mm_cfg.DEFAULT_REPLY_GOES_TO_LIST self.posters = [] self.forbidden_posters = [] self.admin_immed_notify = mm_cfg.DEFAULT_ADMIN_IMMED_NOTIFY self.admin_notify_mchanges = \ mm_cfg.DEFAULT_ADMIN_NOTIFY_MCHANGES self.moderated = mm_cfg.DEFAULT_MODERATED self.require_explicit_destination = \ mm_cfg.DEFAULT_REQUIRE_EXPLICIT_DESTINATION self.acceptable_aliases = mm_cfg.DEFAULT_ACCEPTABLE_ALIASES self.umbrella_list = mm_cfg.DEFAULT_UMBRELLA_LIST self.umbrella_member_suffix = \ mm_cfg.DEFAULT_UMBRELLA_MEMBER_ADMIN_SUFFIX self.send_reminders = mm_cfg.DEFAULT_SEND_REMINDERS self.send_welcome_msg = mm_cfg.DEFAULT_SEND_WELCOME_MSG self.bounce_matching_headers = \ mm_cfg.DEFAULT_BOUNCE_MATCHING_HEADERS self.anonymous_list = mm_cfg.DEFAULT_ANONYMOUS_LIST self.real_name = '%s%s' % (string.upper(self._internal_name[0]), self._internal_name[1:]) self.description = '' self.info = '' self.welcome_msg = '' self.goodbye_msg = '' self.subscribe_policy = mm_cfg.DEFAULT_SUBSCRIBE_POLICY self.private_roster = mm_cfg.DEFAULT_PRIVATE_ROSTER self.obscure_addresses = mm_cfg.DEFAULT_OBSCURE_ADDRESSES self.member_posting_only = mm_cfg.DEFAULT_MEMBER_POSTING_ONLY self.host_name = mm_cfg.DEFAULT_HOST_NAME self.admin_member_chunksize = mm_cfg.DEFAULT_ADMIN_MEMBER_CHUNKSIZE # Analogs to these are initted in Digester.InitVars self.nondigestable = mm_cfg.DEFAULT_NONDIGESTABLE Digester.InitVars(self) # has configurable stuff SecurityManager.InitVars(self, crypted_password) Archiver.InitVars(self) # has configurable stuff ListAdmin.InitVars(self) Bouncer.InitVars(self) GatewayManager.InitVars(self) HTMLFormatter.InitVars(self) # These need to come near the bottom because they're dependent on # other settings. self.subject_prefix = mm_cfg.DEFAULT_SUBJECT_PREFIX % self.__dict__ self.msg_header = mm_cfg.DEFAULT_MSG_HEADER self.msg_footer = mm_cfg.DEFAULT_MSG_FOOTER def GetConfigInfo(self): config_info = {} config_info['digest'] = Digester.GetConfigInfo(self) config_info['archive'] = Archiver.GetConfigInfo(self) config_info['gateway'] = GatewayManager.GetConfigInfo(self) # XXX: Should this text be migrated into the templates dir? config_info['general'] = [ "Fundamental list characteristics, including descriptive" " info and basic behaviors.", ('real_name', mm_cfg.String, 50, 0, 'The public name of this list (make case-changes only).', "The capitalization of this name can be changed to make it" " presentable in polite company as a proper noun, or to make an" " acronym part all upper case, etc. However, the name" " will be advertised as the email address (e.g., in subscribe" " confirmation notices), so it should not be otherwise" " altered. (Email addresses are not case sensitive, but" " they are sensitive to almost everything else:-)"), ('owner', mm_cfg.EmailList, (3,30), 0, "The list admin's email address - having multiple" " admins/addresses (on separate lines) is ok."), ('description', mm_cfg.String, 50, 0, 'A terse phrase identifying this list.', "This description is used when the mailing list is listed with" " other mailing lists, or in headers, and so forth. It should" " be as succinct as you can get it, while still identifying" " what the list is."), ('info', mm_cfg.Text, (7, 50), 0, ' An introductory description - a few paragraphs - about the' ' list. It will be included, as html, at the top of the' ' listinfo page. Carriage returns will end a paragraph - see' ' the details for more info.', "The text will be treated as html except that newlines" " newlines will be translated to <br> - so you can use" " links, preformatted text, etc, but don't put in carriage" " returns except where you mean to separate paragraphs. And" " review your changes - bad html (like some unterminated HTML" " constructs) can prevent display of the entire listinfo page."), ('subject_prefix', mm_cfg.String, 10, 0, 'Prefix for subject line of list postings.', "This text will be prepended to subject lines of messages" " posted to the list, to distinguish mailing list messages in" " in mailbox summaries. Brevity is premium here, it's ok" " to shorten long mailing list names to something more concise," " as long as it still identifies the mailing list."), ('welcome_msg', mm_cfg.Text, (4, 50), 0, 'List-specific text prepended to new-subscriber welcome message', "This value, if any, will be added to the front of the" " new-subscriber welcome message. The rest of the" " welcome message already describes the important addresses" " and URLs for the mailing list, so you don't need to include" " any of that kind of stuff here. This should just contain" " mission-specific kinds of things, like etiquette policies" " or team orientation, or that kind of thing."), ('goodbye_msg', mm_cfg.Text, (4, 50), 0, 'Text sent to people leaving the list. If empty, no special' ' text will be added to the unsubscribe message.'), ('reply_goes_to_list', mm_cfg.Radio, ('Poster', 'List'), 0, 'Are replies to a post directed to the original poster' ' or to the list? Poster is strongly' ' recommended.', "There are many reasons not to introduce headers like reply-to" " into other peoples messages - one is that some posters depend" " on their own reply-to setting to convey their valid email" " addr. See" ' ' '"Reply-To" Munging Considered Harmful for a general.' " discussion of this issue."), ('administrivia', mm_cfg.Radio, ('No', 'Yes'), 0, "(Administrivia filter) Check postings and intercept ones" " that seem to be administrative requests?", "Administrivia tests will check postings to see whether" " it's really meant as an administrative request (like" " subscribe, unsubscribe, etc), and will add it to the" " the administrative requests queue, notifying the " " administrator of the new request, in the process. "), ('umbrella_list', mm_cfg.Radio, ('No', 'Yes'), 0, 'Send password reminders to, eg, "-owner" address instead of' ' directly to user.', "Set this to yes when this list is intended to cascade only to" " other mailing lists. When set, meta notices like confirmations" " and password reminders will be directed to an address derived" " from the member\'s address - it will have the value of" ' \"umbrella_member_suffix\" appended to the' " member\'s account name."), ('umbrella_member_suffix', mm_cfg.String, 8, 0, 'Suffix for use when this list is an umbrella for other lists,' ' according to setting of previous "umbrella_list" setting.', 'When \"umbrella_list\" is set to indicate that this list has' " other mailing lists as members, then administrative notices" " like confirmations and password reminders need to not be sent" " to the member list addresses, but rather to the owner of those" " member lists. In that case, the value of this setting is" " appended to the member\'s account name for such notices." " \'-owner\' is the typical choice. This setting has no" ' effect when \"umbrella_list\" is \"No\".'), ('send_reminders', mm_cfg.Radio, ('No', 'Yes'), 0, 'Send monthly password reminders or no? Overrides the previous ' 'option.'), ('send_welcome_msg', mm_cfg.Radio, ('No', 'Yes'), 0, 'Send welcome message when people subscribe?', "Turn this on only if you plan on subscribing people manually " "and don't want them to know that you did so. This option " "is most useful for transparently migrating lists from " "some other mailing list manager to Mailman."), ('admin_immed_notify', mm_cfg.Radio, ('No', 'Yes'), 0, 'Should administrator get immediate notice of new requests, ' 'as well as daily notices about collected ones?', "List admins are sent daily reminders of pending admin approval" " requests, like subscriptions to a moderated list or postings" " that are being held for one reason or another. Setting this" " option causes notices to be sent immediately on the arrival" " of new requests, as well."), ('admin_notify_mchanges', mm_cfg.Radio, ('No', 'Yes'), 0, 'Should administrator get notices of subscribes/unsubscribes?'), ('dont_respond_to_post_requests', mm_cfg.Radio, ('Yes', 'No'), 0, 'Send mail to poster when their posting is held for approval?', "Approval notices are sent when mail triggers certain of the" " limits except routine list moderation and spam" " filters, for which notices are not sent. This" " option overrides ever sending the notice."), ('max_message_size', mm_cfg.Number, 5, 0, 'Maximum length in Kb of a message body. Use 0 for no limit.'), ('num_spawns', mm_cfg.Number, 3, 0, 'Number of outgoing connections to open at once ' '(expert users only).', "This determines the maximum number of batches into which" " a mass posting will be divided."), ('host_name', mm_cfg.Host, 50, 0, 'Host name this list prefers.', "The host_name is the preferred name for email to mailman-related" " addresses on this host, and generally should be the mail" " host's exchanger address, if any. This setting can be useful" " for selecting among alternative names of a host that has" " multiple addresses."), ('web_page_url', mm_cfg.String, 50, 0, 'Base URL for Mailman web interface', "This is the common root for all mailman URLs concerning this" " list. It is also used in the listinfo overview of mailing" " lists" " to identify whether or not this list resides on the virtual" " host identified by the overview URL - if this value is found" " (anywhere) in the URL, then this list is considered to be" " on that virtual host, and if not, then it is excluded from" " the listing. Note that you should use the \'advertised\'" " privacy option to inhibit any listing of the host."), ] if mm_cfg.ALLOW_OPEN_SUBSCRIBE: sub_cfentry = ('subscribe_policy', mm_cfg.Radio, ('none', 'confirm', 'require approval', 'confirm+approval'), 0, "What steps are required for subscription?
", "None - no verification steps (Not" " Recommended )
" "confirm (*) - email confirmation step" " required
" "require approval - require list administrator" " approval for subscriptions
" "confirm+approval - both confirm and approve" "

(*) when someone requests a subscription," " mailman sends them a notice with a unique" " subscription request number that they must" " reply to in order to subscribe.
This" " prevents mischievous (or malicious) people" " from creating subscriptions for others" " without their consent." ) else: sub_cfentry = ('subscribe_policy', mm_cfg.Radio, ('confirm', 'require approval', 'confirm+approval'), 1, "What steps are required for subscription?
", "confirm (*) - email confirmation required
" "require approval - require list administrator" " approval for subscriptions
" "confirm+approval - both confirm and approve" "

(*) when someone requests a subscription," " mailman sends them a notice with a unique" " subscription request number that they must" " reply to in order to subscribe.
This" " prevents mischievous (or malicious) people" " from creating subscriptions for others" " without their consent." ) config_info['privacy'] = [ "List access policies, including anti-spam measures," " covering members and outsiders." ' (See also the Archival Options' ' section for separate archive-privacy settings.)' % (self.GetRelativeScriptURL('admin')), "Subscribing", ('advertised', mm_cfg.Radio, ('No', 'Yes'), 0, 'Advertise this list when people ask what lists are on ' 'this machine?'), sub_cfentry, "Membership exposure", ('private_roster', mm_cfg.Radio, ('Anyone', 'List members', 'List admin only'), 0, 'Who can view subscription list?', "When set, the list of subscribers is protected by" " member or admin password authentication."), ('obscure_addresses', mm_cfg.Radio, ('No', 'Yes'), 0, "Show member addrs so they're not directly recognizable" ' as email addrs?', "Setting this option causes member email addresses to be" " transformed when they are presented on list web pages (both" " in text and as links), so they're not trivially" " recognizable as email addresses. The intention is to" " to prevent the addresses from being snarfed up by" " automated web scanners for use by spammers."), "General posting filters", ('moderated', mm_cfg.Radio, ('No', 'Yes'), 0, 'Must posts be approved by an administrator?'), ('member_posting_only', mm_cfg.Radio, ('No', 'Yes'), 0, 'Restrict posting privilege to list members?' ' (member_posting_only)', "Use this option if you want to restrict posting to list members." " If you want list members to be able to" " post, plus a handful of other posters, see the posters " " setting below"), ('posters', mm_cfg.EmailList, (5, 30), 1, 'Addresses of members accepted for posting to this' ' list without implicit approval requirement. (See' ' "Restrict ... to list members"' ' for whether or not this is in addition to allowing posting' ' by list members', "Adding entries here will have one of two effects," " according to whether another option restricts posting to" " members.

"), "Spam-specific posting filters", ('require_explicit_destination', mm_cfg.Radio, ('No', 'Yes'), 0, 'Must posts have list named in destination (to, cc) field' ' (or be among the acceptable alias names, specified below)?', "Many (in fact, most) spams do not explicitly name their myriad" " destinations in the explicit destination addresses - in fact," " often the to field has a totally bogus address for" " obfuscation. The constraint applies only to the stuff in" " the address before the '@' sign, but still catches all such" " spams." "

The cost is that the list will not accept unhindered any" " postings relayed from other addresses, unless

    " "
  1. The relaying address has the same name, or" "
  2. The relaying address name is included on the options that" " specifies acceptable aliases for the list.
"), ('acceptable_aliases', mm_cfg.Text, ('4', '30'), 0, 'Alias names (regexps) which qualify as explicit to or cc' ' destination names for this list.', "Alternate list names (the stuff before the '@') that are to be" " accepted when the explicit-destination constraint (a prior" " option) is active. This enables things like cascading" " mailing lists and relays while the constraint is still" " preventing random spams."), ('max_num_recipients', mm_cfg.Number, 3, 0, 'Ceiling on acceptable number of recipients for a posting.', "If a posting has this number, or more, of recipients, it is" " held for admin approval. Use 0 for no ceiling."), ('forbidden_posters', mm_cfg.EmailList, (5, 30), 1, 'Addresses whose postings are always held for approval.', "Email addresses whose posts should always be held for" " approval, no matter what other options you have set." " See also the subsequent option which applies to arbitrary" " content of arbitrary headers."), ('bounce_matching_headers', mm_cfg.Text, ('6', '50'), 0, 'Hold posts with header value matching a specified regexp.', "Use this option to prohibit posts according to specific header" " values. The target value is a regular-expression for" " matching against the specified header. The match is done" " disregarding letter case. Lines beginning with '#' are" " ignored as comments." "

For example:

to: .*@public.com 
says" " to hold all postings with a to mail header" " containing '@public.com' anywhere among the addresses." "

Note that leading whitespace is trimmed from the" " regexp. This can be circumvented in a number of ways, eg" " by escaping or bracketing it." "

See also the forbidden_posters option for" " a related mechanism."), ('anonymous_list', mm_cfg.Radio, ('No', 'Yes'), 0, 'Hide the sender of a message, replacing it with the list ' 'address (Removes From, Sender and Reply-To fields)'), ] config_info['nondigest'] = [ "Policies concerning immediately delivered list traffic.", ('nondigestable', mm_cfg.Toggle, ('No', 'Yes'), 1, 'Can subscribers choose to receive mail immediately,' ' rather than in batched digests?'), ('msg_header', mm_cfg.Text, (4, 55), 0, 'Header added to mail sent to regular list members', "Text prepended to the top of every immediately-delivery" " message.

" + Errors.MESSAGE_DECORATION_NOTE), ('msg_footer', mm_cfg.Text, (4, 55), 0, 'Footer added to mail sent to regular list members', "Text appended to the bottom of every immediately-delivery" " message.

" + Errors.MESSAGE_DECORATION_NOTE), ] config_info['bounce'] = Bouncer.GetConfigInfo(self) return config_info def Create(self, name, admin, crypted_password): if name in Utils.list_names(): raise ValueError, 'List %s already exists.' % name Utils.ValidateEmail(admin) Utils.MakeDirTree(os.path.join(mm_cfg.LIST_DATA_DIR, name)) self._full_path = os.path.join(mm_cfg.LIST_DATA_DIR, name) self._internal_name = name self.Lock() self.InitVars(name, admin, crypted_password) self._ready = 1 self.InitTemplates() self.Save() self.CreateFiles() def CreateFiles(self): # Touch these files so they have the right dir perms no matter what. # A "just-in-case" thing. This shouldn't have to be here. ou = os.umask(002) try: open(os.path.join(mm_cfg.LOCK_DIR, '%s.lock' % self._internal_name), 'a+').close() open(os.path.join(self._full_path, "next-digest"), "a+").close() open(os.path.join(self._full_path, "next-digest-topics"), "a+").close() finally: os.umask(ou) def Save(self): # If more than one client is manipulating the database at once, we're # pretty hosed. That's a good reason to make this a daemon not a # program. self.IsListInitialized() # copy all public attributes to marshalable dictionary dict = {} for key, value in self.__dict__.items(): if key[0] <> '_': dict[key] = value # we want to write this dict in a marshal, but be especially paranoid # about how we write the config.db, so we'll be as robust as possible # in the face of, e.g. disk full errors. The idea is that we want to # guarantee that config.db is always valid. The old way had the bad # habit of writing an incomplete file, which happened to be a valid # (but bogus) marshal. fname = os.path.join(self._full_path, 'config.db') fname_tmp = fname + '.tmp.' + `os.getpid()` fname_last = fname + ".last" omask = os.umask(007) try: try: fp = open(fname_tmp, 'w') marshal.dump(dict, fp) fp.close() except IOError, status: os.unlink(fname_tmp) self.LogMsg('error', 'Failed config.db file write, retaining old state' '\n %s' % `status.args`) Utils.reraise() # now move config.db -> config.db.last # then move config.db.tmp.xxx -> config.db aside_new(fname, fname_last) aside_new(fname_tmp, fname) finally: os.umask(omask) self.CheckHTMLArchiveDir() def Load(self, check_version = 1): if self._tmp_lock: self.Lock() try: file = open(os.path.join(self._full_path, 'config.db'), 'r') except IOError: raise Errors.MMBadListError, 'Failed to access config info' try: dict = marshal.load(file) if type(dict) <> DictType: raise Errors.MMBadListError, \ 'Unmarshaled config info is not a dictionary' except (EOFError, ValueError, TypeError), e: raise Errors.MMBadListError, ('Failed to unmarshal config info: ' + e) for key, value in dict.items(): setattr(self, key, value) file.close() self._ready = 1 if check_version: self.CheckValues() self.CheckVersion(dict) def LogMsg(self, kind, msg, *args): """Append a message to the log file for messages of specified kind.""" # For want of a better fallback, we use sys.stderr if we can't get # a log file. We need a better way to warn of failed log access... if self._log_files.has_key(kind): logf = self._log_files[kind] else: logf = self._log_files[kind] = StampedLogger(kind) logf.write(msg % args + '\n') logf.flush() def CheckVersion(self, stored_state): """Migrate prior version's state to new structure, if changed.""" if (self.data_version >= mm_cfg.DATA_FILE_VERSION and type(self.data_version) == type(mm_cfg.DATA_FILE_VERSION)): return else: self.InitVars() # Init any new variables, self.Load(check_version = 0) # then reload the file from versions import Update Update(self, stored_state) self.data_version = mm_cfg.DATA_FILE_VERSION self.Save() def CheckValues(self): """Normalize selected values to known formats.""" if self.web_page_url and self.web_page_url[-1] != '/': self.web_page_url = self.web_page_url + '/' def IsListInitialized(self): if not self._ready: raise Errors.MMListNotReady def AddMember(self, name, password, digest=0, remote=None): self.IsListInitialized() # normalize the name, it could be of the form # # User Name # person@place.com (User Name) # etc # name = Utils.ParseAddrs(name) # Remove spaces... it's a common thing for people to add... name = string.join(string.split(name), '') # lower case only the domain part name = Utils.LCDomain(name) # Validate the e-mail address to some degree. Utils.ValidateEmail(name) if self.IsMember(name): raise Errors.MMAlreadyAMember if name == string.lower(self.GetListEmail()): # Trying to subscribe the list to itself! raise Errors.MMBadEmailError if digest and not self.digestable: raise Errors.MMCantDigestError elif not digest and not self.nondigestable: raise Errors.MMMustDigestError if self.subscribe_policy == 0: # no confirmation or approval necessary: self.ApprovedAddMember(name, password, digest) elif self.subscribe_policy == 1 or self.subscribe_policy == 3: # confirmation: from Pending import Pending cookie = Pending().new(name, password, digest) if remote is not None: by = " " + remote remote = " from %s" % remote else: by = "" remote = "" recipient = self.GetMemberAdminEmail(name) text = Utils.maketext('verify.txt', {"email" : name, "listaddr" : self.GetListEmail(), "listname" : self.real_name, "cookie" : cookie, "hostname" : remote, "requestaddr": self.GetRequestEmail(), "remote" : remote, "listadmin" : self.GetAdminEmail(), }) self.SendTextToUser( subject=("%s -- confirmation of subscription -- request %d" % (self.real_name, cookie)), recipient = recipient, sender = self.GetRequestEmail(), text = text, add_headers = ["Reply-to: %s" % self.GetRequestEmail(), "Errors-To: %s" % self.GetAdminEmail()]) if recipient != name: who = "%s (%s)" % (name, string.split(recipient, '@')[0]) else: who = name self.LogMsg("subscribe", "%s: pending %s %s", self._internal_name, who, by) raise Errors.MMSubscribeNeedsConfirmation else: # approval needed self.AddRequest('add_member', digest, name, password) raise Errors.MMNeedApproval, self.GetAdminEmail() def ApprovedAddMember(self, name, password, digest, ack=None, admin_notif=None): res = self.ApprovedAddMembers([name], [password], digest, ack, admin_notif) # There should be exactly one (key, value) pair in the returned dict, # extract the possible exception value res = res.values()[0] if res is None: # User was added successfully return else: # Split up the exception list and reraise it here e, v = res raise e, v def ApprovedAddMembers(self, names, passwords, digest, ack=None, admin_notif=None): """Subscribe members in list `names'. Passwords can be supplied in the passwords list. If an empty password is encountered, a random one is generated and used. Returns a dict where the keys are addresses that were tried subscribed, and the corresponding values are either two-element tuple containing the first exception type and value that was raised when trying to add that address, or `None' to indicate that no exception was raised. """ if ack is None: if self.send_welcome_msg: ack = 1 else: ack = 0 if admin_notif is None: if self.admin_notify_mchanges: admin_notif = 1 else: admin_notif = 0 if type(passwords) is type([]): pass else: # Type error -- ignore the original value passwords = [None] * len(names) while len(passwords) < len(names): passwords.append(None) result = {} dirty = 0 for i in range(len(names)): try: # normalize the name, it could be of the form # # User Name # person@place.com (User Name) # etc # name = Utils.ParseAddrs(names[i]) Utils.ValidateEmail(name) name = Utils.LCDomain(name) except (Errors.MMBadEmailError, Errors.MMHostileAddress): # We don't really need the traceback object for the exception, # and as using it in the wrong way prevents garbage collection # from working smoothly, we strip it away result[name] = sys.exc_info()[:2] # WIBNI we could `continue' within `try' constructs... if result.has_key(name): continue if self.IsMember(name): result[name] = [Errors.MMAlreadyAMember, None] continue self.__AddMember(name, digest) self.SetUserOption(name, mm_cfg.DisableMime, 1 - self.mime_is_default_digest, save_list=0) # Make sure we set a "good" password password = passwords[i] if not password: password = Utils.MakeRandomPassword() self.passwords[string.lower(name)] = password # An address has been added successfully, make sure the # list config is saved later on dirty = 1 result[name] = None if dirty: self.Save() if digest: kind = " (D)" else: kind = "" for name in result.keys(): if result[name] is None: self.LogMsg("subscribe", "%s: new%s %s", self._internal_name, kind, name) if ack: self.SendSubscribeAck( name, self.passwords[string.lower(name)], digest) if admin_notif: import Message txt = Utils.maketext( "adminsubscribeack.txt", {"mmowner": mm_cfg.MAILMAN_OWNER, "admin_email": self.GetAdminEmail(), "listname": self.real_name, "member": name}, 1) msg = Message.IncomingMessage(txt) self.DeliverToOwner(msg, self.owner) return result def ProcessConfirmation(self, cookie): from Pending import Pending got = Pending().confirmed(cookie) if not got: raise Errors.MMBadConfirmation else: (email_addr, password, digest) = got if self.subscribe_policy == 3: # confirm + approve self.AddRequest('add_member', digest, email_addr, password) raise Errors.MMNeedApproval, self.GetAdminEmail() self.ApprovedAddMember(email_addr, password, digest) self.Save() def DeleteMember(self, name, whence=None, admin_notif=None): self.IsListInitialized() # FindMatchingAddresses *should* never return more than 1 address. # However, should log this, just to make sure. aliases = Utils.FindMatchingAddresses(name, self.members, self.digest_members) if not len(aliases): raise Errors.MMNoSuchUserError def DoActualRemoval(alias, me=self): kind = "(unfound)" try: del me.passwords[alias] except KeyError: pass if me.user_options.has_key(alias): del me.user_options[alias] try: del me.members[alias] kind = "regular" except KeyError: pass try: del me.digest_members[alias] kind = "digest" except KeyError: pass map(DoActualRemoval, aliases) if self.goodbye_msg and len(self.goodbye_msg): self.SendUnsubscribeAck(name) self.ClearBounceInfo(name) self.Save() if admin_notif is None: if self.admin_notify_mchanges: admin_notif = 1 else: admin_notif = 0 if admin_notif: import Message txt = Utils.maketext("adminunsubscribeack.txt", {"mmowner": mm_cfg.MAILMAN_OWNER, "admin_email": self.GetAdminEmail(), "listname": self.real_name, "member": name}, 1) msg = Message.IncomingMessage(txt) self.DeliverToOwner(msg, self.owner) if whence: whence = "; %s" % whence else: whence = "" self.LogMsg("subscribe", "%s: deleted %s%s", self._internal_name, name, whence) def IsMember(self, address): return len(Utils.FindMatchingAddresses(address, self.members, self.digest_members)) def HasExplicitDest(self, msg): """True if list name or any acceptable_alias is included among the to or cc addrs.""" # Note that qualified host can be different! This allows, eg, for # relaying from remote lists that have the same name. Still # stringent, but offers a way to provide for remote exploders. lowname = string.lower(self.real_name) recips = [] # First check all dests against simple name: for recip in msg.getaddrlist('to') + msg.getaddrlist('cc'): curr = string.lower(string.split(recip[1], '@')[0]) if lowname == curr: return 1 recips.append(curr) # ... and only then try the regexp acceptable aliases. for recip in recips: for alias in string.split(self.acceptable_aliases, '\n'): stripped = string.strip(alias) try: # The list alias in `stripped` is a user supplied regexp, # which could be malformed. if stripped and re.match(stripped, recip): return 1 except re.error: # `stripped' is a malformed regexp -- try matching # safely, with all non-alphanumerics backslashed: if stripped and re.match(re.escape(stripped), recip): return 1 return 0 def parse_matching_header_opt(self): """Return a list of triples [(field name, regex, line), ...].""" # - Blank lines and lines with '#' as first char are skipped. # - Leading whitespace in the matchexp is trimmed - you can defeat # that by, eg, containing it in gratuitous square brackets. all = [] for line in string.split(self.bounce_matching_headers, '\n'): stripped = string.strip(line) if not stripped or (stripped[0] == "#"): # Skip blank lines and lines *starting* with a '#'. continue else: try: h, e = re.split(":[ \t]*", stripped, 1) try: re.compile(e) all.append((h, e, stripped)) except re.error, cause: # The regexp in this line is malformed -- log it # and ignore it self.LogMsg("config", "%s - " "bad regexp %s [%s] " "in bounce_matching_header line %s" % (self.real_name, `e`, `cause`, `stripped`)) except ValueError: # Whoops - some bad data got by: self.LogMsg("config", "%s - " "bad bounce_matching_header line %s" % (self.real_name, `stripped`)) return all def HasMatchingHeader(self, msg): """True if named header field (case-insensitive) matches regexp. Case insensitive. Returns constraint line which matches or empty string for no matches.""" pairs = self.parse_matching_header_opt() for field, matchexp, line in pairs: fragments = msg.getallmatchingheaders(field) subjs = [] l = len(field) for f in fragments: # Consolidate header lines, stripping header name & whitespace. if (len(f) > l and f[l] == ":" and string.lower(field) == string.lower(f[0:l])): # Non-continuation line - trim header name: subjs.append(f[l+2:]) elif not subjs: # Whoops - non-continuation that matches? subjs.append(f) else: # Continuation line. subjs[-1] = subjs[-1] + f for s in subjs: # This is safe because parse_matching_header_opt only # returns valid regexps if re.search(matchexp, s, re.I): return line return 0 # msg should be an IncomingMessage object. def Post(self, msg, approved=0): self.IsListInitialized() # Be sure to ExtractApproval, whether or not flag is already set! msgapproved = self.ExtractApproval(msg) if not approved: approved = msgapproved sender = None if mm_cfg.USE_ENVELOPE_SENDER: sender = msg.GetEnvelopeSender() if not sender: sender = msg.GetSender() ## sys.stderr.write('envsend: %s, sender: %s\n' % ## (msg.GetEnvelopeSender(), msg.GetSender())) # If it's the admin, which we know by the approved variable, # we can skip a large number of checks. if not approved: beentheres = map(lambda x: string.split(x, ": ")[1][:-1], msg.getallmatchingheaders('x-beenthere')) if self.GetListEmail() in beentheres: # Exit from scripts/post - no longer held raise Errors.MMLoopingPost if len(self.forbidden_posters): forbidden_posters = Utils.List2Dict(self.forbidden_posters) addrs = Utils.FindMatchingAddresses(sender, forbidden_posters) if len(addrs): self.AddRequest('post', Utils.SnarfMessage(msg), Errors.FORBIDDEN_SENDER_MSG, msg.getheader('subject')) if self.moderated and not len(self.posters): self.AddRequest('post', Utils.SnarfMessage(msg), Errors.MODERATED_LIST_MSG, msg.getheader('subject')) elif self.moderated and len(self.posters): addrs = Utils.FindMatchingAddresses( sender, Utils.List2Dict(self.posters)) if not len(addrs): self.AddRequest('post', Utils.SnarfMessage(msg), Errors.MODERATED_LIST_MSG, msg.getheader('subject')) # # not moderated # elif len(self.posters): addrs = Utils.FindMatchingAddresses( sender, Utils.List2Dict(self.posters)) if not len(addrs): if self.member_posting_only: if not self.IsMember(sender): self.AddRequest('post', Utils.SnarfMessage(msg), 'Only approved posters may post' ' without moderator approval.', msg.getheader('subject')) else: self.AddRequest('post', Utils.SnarfMessage(msg), 'Only approved posters may post' ' without moderator approval.', msg.getheader('subject')) elif self.member_posting_only and not self.IsMember(sender): self.AddRequest('post', Utils.SnarfMessage(msg), 'Postings from member addresses only.', msg.getheader('subject')) if self.max_num_recipients > 0: recips = [] toheader = msg.getheader('to') if toheader: recips = recips + string.split(toheader, ',') ccheader = msg.getheader('cc') if ccheader: recips = recips + string.split(ccheader, ',') if len(recips) > self.max_num_recipients: self.AddRequest('post', Utils.SnarfMessage(msg), 'Too many recipients.', msg.getheader('subject')) if (self.require_explicit_destination and not self.HasExplicitDest(msg)): self.AddRequest('post', Utils.SnarfMessage(msg), Errors.IMPLICIT_DEST_MSG, msg.getheader('subject')) if self.administrivia and Utils.IsAdministrivia(msg): self.AddRequest('post', Utils.SnarfMessage(msg), 'possible administrivia to list', msg.getheader("subject")) if self.bounce_matching_headers: triggered = self.HasMatchingHeader(msg) if triggered: # Darn - can't include the matching line for the admin # message because the info would also go to the sender. self.AddRequest('post', Utils.SnarfMessage(msg), Errors.SUSPICIOUS_HEADER_MSG, msg.getheader('subject')) if self.max_message_size > 0: if len(msg.body)/1024. > self.max_message_size: self.AddRequest('post', Utils.SnarfMessage(msg), 'Message body too long (>%dk)' % self.max_message_size, msg.getheader('subject')) # Prepend the subject_prefix to the subject line. subj = msg.getheader('subject') prefix = self.subject_prefix if not subj: msg.SetHeader('Subject', '%s(no subject)' % prefix) elif prefix and not re.search(re.escape(self.subject_prefix), subj, re.I): msg.SetHeader('Subject', '%s%s' % (prefix, subj)) if self.anonymous_list: del msg['reply-to'] del msg['sender'] msg.SetHeader('From', self.GetAdminEmail()) msg.SetHeader('Reply-to', self.GetListEmail()) if self.digestable: self.SaveForDigest(msg) if self.archive: self.ArchiveMail(msg) if self.gateway_to_news: self.SendMailToNewsGroup(msg) dont_send_to_sender = 0 ack_post = 0 # Try to get the address the list thinks this sender is sender = self.FindUser(msg.GetSender()) if sender: if self.GetUserOption(sender, mm_cfg.DontReceiveOwnPosts): dont_send_to_sender = 1 if self.GetUserOption(sender, mm_cfg.AcknowlegePosts): ack_post = 1 # Deliver the mail. members = self.GetDeliveryMembers() recipients = [] for m in members: if not self.GetUserOption(m, mm_cfg.DisableDelivery): recipients.append(m) if dont_send_to_sender: try: recipients.remove(self.GetUserSubscribedAddress(sender)) except ValueError: # sender does not want to get copies of their own messages # (not metoo), but delivery to their address is disabled # (nomail) pass self.LogMsg("post", "post to %s from %s size=%d", self._internal_name, msg.GetSender(), len(msg.body)) self.DeliverToList(msg, recipients, header = self.msg_header % self.__dict__, footer = self.msg_footer % self.__dict__) if ack_post: self.SendPostAck(msg, sender) self.last_post_time = time.time() self.post_id = self.post_id + 1 self.Save() def Locked(self): try: return self._lock_file and 1 except AttributeError: return 0 def Lock(self): try: if self._lock_file: return except AttributeError: return ou = os.umask(0) try: self._lock_file = posixfile.open( os.path.join(mm_cfg.LOCK_DIR, '%s.lock' % self._internal_name), 'a+') finally: os.umask(ou) self._lock_file.lock('w|', 1) def Unlock(self): if self.Locked(): self._lock_file.lock('u') self._lock_file.close() self._lock_file = None def __repr__(self): if self.Locked(): status = " (locked)" else: status = "" return ("<%s.%s %s%s at %s>" % (self.__module__, self.__class__.__name__, `self._internal_name`, status, hex(id(self))[2:])) def aside_new(old_name, new_name, reopen=0): """Utility to move aside a file, optionally returning a fresh open version. We ensure maintanance of proper umask in the process.""" # Make config.db unreadable by `other', as it contains all the list # members' passwords (in clear text). ou = os.umask(007) try: if os.path.exists(new_name): os.unlink(new_name) if os.path.exists(old_name): os.link(old_name, new_name) os.unlink(old_name) if reopen: file = open(old_name, 'w') return file finally: os.umask(ou)